Lansheng Han

Orcid: 0000-0001-7529-729X

According to our database1, Lansheng Han authored at least 76 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection.
IEEE Trans. Software Eng., October, 2024

Space Decoupled Prototype Learning for Few-Shot Attack Detection in Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, October, 2024

DCDroid: An APK Static Identification Method Based on Naïve Bayes Classifier and Dual-Centrality Analysis.
IET Inf. Secur., 2024

CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification.
CoRR, 2024

Research and application of artificial intelligence based webshell detection model: A literature review.
CoRR, 2024

Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems.
CoRR, 2024

Research and application of Transformer based anomaly detection model: A literature review.
CoRR, 2024

Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples.
CoRR, 2024

MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network.
Comput. Secur., 2024

Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
BTAD: A binary transformer deep neural network model for anomaly detection in multivariate time series data.
Adv. Eng. Informatics, April, 2023

Few-shot Detection of Anomalies in Industrial Cyber-Physical System via Prototypical Network and Contrastive Learning.
CoRR, 2023

VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs.
Comput. Secur., 2023

Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system.
Veh. Commun., 2022

CVDF DYNAMIC - A Dynamic Fuzzy Testing Sample Generation Framework Based on BI-LSTM and Genetic Algorithm.
Sensors, 2022

WebCrack: Dynamic Dictionary Adjustment for Web Weak Password Detection based on Blasting Response Event Discrimination.
CoRR, 2022

IFAttn: Binary code similarity analysis based on interpretable features with attention.
Comput. Secur., 2022

Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity.
Proceedings of the IEEE International Conference on Trust, 2022

A Novel Network Security Situation Awareness Model for Advanced Persistent Threat.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Intrusion Detection System for IoT Heterogeneous Perceptual Network.
Mob. Networks Appl., 2021

Function-level obfuscation detection method based on Graph Convolutional Networks.
J. Inf. Secur. Appl., 2021

Adaptive evaluation model of web spam based on link relation.
Trans. Emerg. Telecommun. Technol., 2021

Security of multimedia communication with game trick based fast, efficient, and robust color-/gray-scale image encryption algorithm.
Trans. Emerg. Telecommun. Technol., 2021

2020
Gödel's Sentence Is An Adversarial Example But Unsolvable.
CoRR, 2020

A Fixed point view: A Model-Based Clustering Framework.
CoRR, 2020

Cooperative malicious network behavior recognition algorithm in E-commerce.
Comput. Secur., 2020

Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant.
Comput. Networks, 2020

Deep Learning-Based Reverse Method of Binary Protocol.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model.
Inf. Sci., 2019

Search engine: The social relationship driving power of Internet of Things.
Future Gener. Comput. Syst., 2019

3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA.
Entropy, 2019

Targeting malware discrimination based on reversed association task.
Concurr. Comput. Pract. Exp., 2019

A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI.
IEEE Access, 2019

An Optimized Static Propositional Function Model to Detect Software Vulnerability.
IEEE Access, 2019

A live migration strategy for virtual encryption card equipment.
Proceedings of the 3rd International Conference on High Performance Compilation, 2019

2018
Owner based malware discrimination.
Future Gener. Comput. Syst., 2018

An adaptive control momentum method as an optimizer in the cloud.
Future Gener. Comput. Syst., 2018

Equilibrium Index and Core Node Set of New Social Networks.
IEEE Access, 2018

2017
基于博弈的无线传感器网络入侵检测模型 (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory).
计算机科学, 2017

Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017

The Impact of the Collective Influence of Search Engines on Social Networks.
IEEE Access, 2017

Malware Discrimination Based on Reversed Association Task.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability).
计算机科学, 2016

Model Checking Probabilistic Network Propagation Protection Strategies.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Group Assist Recommendation Model Based on Intelligent Mobile Terminals - GARMIT.
Proceedings of the Mobile Web and Intelligent Information Systems, 2016

Communities Evolution Analysis Based on Events in Dynamic Complex Network.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
基于相识度的恶意代码检测 (Detection of Malware Code Based on Acquaintance Degree).
计算机科学, 2015

Multidimensional Trust Evaluation Model Based on Redemption and Data Aggregation.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Search Engine: A Hidden Power for Virus Propagation in Community Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Evolutionary Virus Immune Strategy Based on Community Vitality.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
K-clique community detection based on union-find.
Proceedings of the International Conference on Computer, 2014

2013
A post-quantum provable data possession protocol in cloud.
Secur. Commun. Networks, 2013

Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model.
Inf. Sci., 2013

Community Vitality in Dynamic Temporal Networks.
Int. J. Distributed Sens. Networks, 2013

Virus propagation power of the dynamic network.
EURASIP J. Wirel. Commun. Netw., 2013

Efficient Fair UC-Secure Two-Party Computation on Committed Inputs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Projection Pursuit Based Wormhole Detection in Ad Hoc Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Algebra-Based Behavior Identification of Trojan Horse.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Task-based behavior detection of illegal codes.
Math. Comput. Model., 2012

The Probability of Trojan Attacks on Multi-level Security Strategy based Network.
J. Networks, 2012

2011
GRAP: Grey risk assessment based on projection in ad hoc networks.
J. Parallel Distributed Comput., 2011

Virus Detection Method based on Behavior Resource Tree.
J. Inf. Process. Syst., 2011

2010
A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

2009
Sub-connection Based Isolation Against Network Virus.
J. Digit. Content Technol. its Appl., 2009

A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

An Evaluating Model for Anti-virus Ability Based on AHP.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2007
The Epidemic Threshold of a More General Epidemic Spreading Model for Network Viruses.
Proceedings of the Third International Conference on Natural Computation, 2007

Fuzzy Tracing the Source of Net-Virus.
Proceedings of the Fuzzy Information and Engineering, 2007

2006
Network Based Immunization Against Computer Virus.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

Tracing the Source of Net-Virus within a Subnet.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Analytic Model for Network Viruses.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...